首页 > 最新文献

2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)最新文献

英文 中文
Study on BFGS fitting method of metal high cycle fatigue damage parameters 金属高周疲劳损伤参数BFGS拟合方法研究
Yongjie Zhang, Yanyun Xu, Zheng Yang, Qin Sun
In order to obtain more accurate Lemaitre high cycle fatigue damage parameters, a BFGS quasi-Newton fitting method is proposed by optimizing the residual difference between the predicted life and actual life in the least square method. The damage parameters are solved in the damage evolution equation of metal high cycle fatigue. Taking 2A12-T4 aluminum alloy as an example, the precision and solution efficiency of BFGS quasi-Newton fitting method were verified for the evaluation of metal high cycle fatigue life.
为了获得更精确的Lemaitre高周疲劳损伤参数,采用最小二乘法对预测寿命与实际寿命的残差进行优化,提出了BFGS准牛顿拟合方法。在金属高周疲劳损伤演化方程中求解损伤参数。以2A12-T4铝合金为例,验证了BFGS准牛顿拟合方法对金属高周疲劳寿命评估的精度和求解效率。
{"title":"Study on BFGS fitting method of metal high cycle fatigue damage parameters","authors":"Yongjie Zhang, Yanyun Xu, Zheng Yang, Qin Sun","doi":"10.1109/ICSESS.2017.8342957","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342957","url":null,"abstract":"In order to obtain more accurate Lemaitre high cycle fatigue damage parameters, a BFGS quasi-Newton fitting method is proposed by optimizing the residual difference between the predicted life and actual life in the least square method. The damage parameters are solved in the damage evolution equation of metal high cycle fatigue. Taking 2A12-T4 aluminum alloy as an example, the precision and solution efficiency of BFGS quasi-Newton fitting method were verified for the evaluation of metal high cycle fatigue life.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127719655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incremental k-NN SVM method in intrusion detection 入侵检测中的增量k-NN SVM方法
Binhan Xu, Shuyu Chen, Hancui Zhang, Tianshu Wu
The intrusion or attack in the computer network is one of the most important issues in Cloud environment. Due to enormous network traffic, dynamic and incremental learning is important to intrusion detection system (IDS) in Cloud. In existing incremental algorithms, k Nearest Neighbors (k-NN) has the advantage of dealing with the huge and incremental multi-class nature of data. However, k-NN algorithm has poor performance in classification. Support Vector Machine (SVM) is an extraordinary classification method widely used in intrusion detection field, while its training time increases sharply with expansion of training data. Therefore, we proposed Incremental k-NN SVM method using combination of k-NN and SVM, bringing advantages of the both methods. In this approach an R∗-tree provides efficient expansion of training data and query for k-NN. Experiments on open dataset KDDCUP 99 indicates that Incremental k-NN SVM intrusion detection method has the ability to learn and update with new data in acceptable time, and its predicting time does not increase rapidly along the incremental learning process.
计算机网络中的入侵或攻击是云环境中最重要的问题之一。由于庞大的网络流量,动态和增量学习对云环境下的入侵检测系统至关重要。在现有的增量算法中,k近邻算法(k- nn)在处理数据的庞大和增量的多类特性方面具有优势。然而,k-NN算法在分类方面的性能较差。支持向量机(SVM)是一种广泛应用于入侵检测领域的特殊分类方法,随着训练数据的扩大,其训练时间急剧增加。因此,我们提出了将k-NN和SVM相结合的增量k-NN支持向量机方法,将两者的优点结合起来。在这种方法中,R *树为k-NN提供了有效的训练数据扩展和查询。在开放数据集KDDCUP 99上的实验表明,增量k-NN SVM入侵检测方法具有在可接受的时间内学习和更新新数据的能力,并且其预测时间不会随着增量学习过程而快速增加。
{"title":"Incremental k-NN SVM method in intrusion detection","authors":"Binhan Xu, Shuyu Chen, Hancui Zhang, Tianshu Wu","doi":"10.1109/ICSESS.2017.8343013","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8343013","url":null,"abstract":"The intrusion or attack in the computer network is one of the most important issues in Cloud environment. Due to enormous network traffic, dynamic and incremental learning is important to intrusion detection system (IDS) in Cloud. In existing incremental algorithms, k Nearest Neighbors (k-NN) has the advantage of dealing with the huge and incremental multi-class nature of data. However, k-NN algorithm has poor performance in classification. Support Vector Machine (SVM) is an extraordinary classification method widely used in intrusion detection field, while its training time increases sharply with expansion of training data. Therefore, we proposed Incremental k-NN SVM method using combination of k-NN and SVM, bringing advantages of the both methods. In this approach an R∗-tree provides efficient expansion of training data and query for k-NN. Experiments on open dataset KDDCUP 99 indicates that Incremental k-NN SVM intrusion detection method has the ability to learn and update with new data in acceptable time, and its predicting time does not increase rapidly along the incremental learning process.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133764960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Analysis of energy demand forecasting model in the context of electric power alteration 电力变化背景下的能源需求预测模型分析
B. Shan, D. Jia, Lu Zhang, Fang Cao, Yi Sun
The electric power alteration strategy can realize the substitution of the power supply for the coal and the fuel in the terminal energy consumption, which can realize the fundamental change of energy development mode. In this paper, to provide theoretical guidance for grid planning, energy demand forecasting model influencing factors in the context of electric power alteration are thoroughly analyzed, which concludes four key influence factors including environmental protection pressure restriction, energy price fluctuation, policy support and technical substitution. Combined all the factors, energy demand forecasting models in the context of electric power alteration including the Markal model(Market Allocation Model), LEAP model, MAED model(Model for Analysis of Energy Demand) are built, which can provide references for electric power alteration in China.
变电战略可以实现电力在终端能源消费上对煤和燃料的替代,可以实现能源发展方式的根本转变。本文深入分析了电力变电背景下的能源需求预测模型的影响因素,为电网规划提供理论指导,归纳出环境保护压力制约、能源价格波动、政策支持和技术替代四大关键影响因素。综合各因素,构建了电力变电背景下的能源需求预测模型,包括市场配置模型(Markal model)、LEAP模型、能源需求分析模型(MAED model),可为中国电力变电提供参考。
{"title":"Analysis of energy demand forecasting model in the context of electric power alteration","authors":"B. Shan, D. Jia, Lu Zhang, Fang Cao, Yi Sun","doi":"10.1109/ICSESS.2017.8343032","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8343032","url":null,"abstract":"The electric power alteration strategy can realize the substitution of the power supply for the coal and the fuel in the terminal energy consumption, which can realize the fundamental change of energy development mode. In this paper, to provide theoretical guidance for grid planning, energy demand forecasting model influencing factors in the context of electric power alteration are thoroughly analyzed, which concludes four key influence factors including environmental protection pressure restriction, energy price fluctuation, policy support and technical substitution. Combined all the factors, energy demand forecasting models in the context of electric power alteration including the Markal model(Market Allocation Model), LEAP model, MAED model(Model for Analysis of Energy Demand) are built, which can provide references for electric power alteration in China.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134021542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Krill Herd Optimization algorithm for cancer feature selection and random forest technique for classification 磷虾群优化算法的癌症特征选择和随机森林技术的分类
R. R. Rani, D. Ramyachitra
The Cancer Feature Selection and classification problem is one of the prevalent tasks in computational molecular biology. Detecting a gene or list of genes which cause cancer can be acknowledged using the feature selection and classification which leads to giving a faultless treatment for patient and drug discovery of the particular gene. The feature selection and classification of cancer using microarray gene expression data is a computationally difficult task. Even now, the computation of gene selection and classification is a challenging area to provide an exact biological related gene that causes cancer. In this work, three methods have been proposed. One is the Fish Swarm Optimization algorithm along with both Support Vector Machine and Random Forest technique for cancer feature selection and classification. But the above methods have reduced very few features from the datasets. Thus, they are considered as an existing method for this work. Now, the second proposed method namely an enhanced Krill Herd Optimization (KHO) technique was employed for selecting the genes and Random Forest (RF) Technique was employed to classify the cancer types. The Random Forest classification has been used because of its accurate classification accuracy. First, the subset of features is selected using KHO and the Random Forest classification is applied to the selected features. Ten different gene microarray cancer datasets were used to evaluate the efficiency of the proposed. The proposed KHO/RF method is compared with other well-known existing methods like PSO/SVM, PSO/RF, FSO/SVM and FSO/RF. As an outcome, the proposed method outperforms the other existing methods with 100% accuracy of results for most datasets.
肿瘤特征选择与分类问题是计算分子生物学研究的热点问题之一。使用特征选择和分类可以识别导致癌症的基因或基因列表,从而为特定基因的患者和药物发现提供完美的治疗。利用微阵列基因表达数据对癌症进行特征选择和分类是一项计算困难的任务。即使是现在,基因选择和分类的计算仍然是一个具有挑战性的领域,无法提供导致癌症的确切生物学相关基因。在这项工作中,提出了三种方法。一种是鱼群优化算法,结合支持向量机和随机森林技术进行癌症特征选择和分类。但上述方法从数据集中减少的特征很少。因此,它们被认为是这项工作的现有方法。目前,第二种方法即增强型磷虾群优化(KHO)技术用于基因选择,随机森林(RF)技术用于癌症类型分类。随机森林分类法因其准确的分类精度而得到广泛应用。首先,使用KHO选择特征子集,并对所选特征应用随机森林分类。使用10个不同的基因微阵列癌症数据集来评估所提出的效率。将KHO/RF方法与现有的PSO/SVM、PSO/RF、FSO/SVM和FSO/RF等方法进行了比较。结果表明,对于大多数数据集,该方法的结果准确率为100%,优于其他现有方法。
{"title":"Krill Herd Optimization algorithm for cancer feature selection and random forest technique for classification","authors":"R. R. Rani, D. Ramyachitra","doi":"10.1109/ICSESS.2017.8342875","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342875","url":null,"abstract":"The Cancer Feature Selection and classification problem is one of the prevalent tasks in computational molecular biology. Detecting a gene or list of genes which cause cancer can be acknowledged using the feature selection and classification which leads to giving a faultless treatment for patient and drug discovery of the particular gene. The feature selection and classification of cancer using microarray gene expression data is a computationally difficult task. Even now, the computation of gene selection and classification is a challenging area to provide an exact biological related gene that causes cancer. In this work, three methods have been proposed. One is the Fish Swarm Optimization algorithm along with both Support Vector Machine and Random Forest technique for cancer feature selection and classification. But the above methods have reduced very few features from the datasets. Thus, they are considered as an existing method for this work. Now, the second proposed method namely an enhanced Krill Herd Optimization (KHO) technique was employed for selecting the genes and Random Forest (RF) Technique was employed to classify the cancer types. The Random Forest classification has been used because of its accurate classification accuracy. First, the subset of features is selected using KHO and the Random Forest classification is applied to the selected features. Ten different gene microarray cancer datasets were used to evaluate the efficiency of the proposed. The proposed KHO/RF method is compared with other well-known existing methods like PSO/SVM, PSO/RF, FSO/SVM and FSO/RF. As an outcome, the proposed method outperforms the other existing methods with 100% accuracy of results for most datasets.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130358402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Region-based template matching method for multi-view coastline image stitching 基于区域模板匹配的多视角海岸线图像拼接方法
Bo Wang, Zhiqiang Wei, Z. Li, Wei Hu, Shuang Wang, Shugang Zhang, Changehe Du, Wenjuan Shi
Coastal environment is one of the most important part in human activities environment, so coastline studying has great significance to us. Since the coastline stretches widely, shot by many cameras at the same time in different regions currently, and we need spliced it into a complete coastline for further study. However, the feature points of the beach are difficult to be extracted, we use the region-based template matching method to splice it in this paper. An efficient template matching method was proposed to solve the time-consuming classical algorithm of exhaustive search and low efficiency of template selection. Through the experiments, most of the coastline can be spliced better and faster than MAD method.
海岸带环境是人类活动环境的重要组成部分,海岸带研究对我们具有重要意义。由于海岸线延伸的范围很广,目前在不同的区域有多台摄像机同时拍摄,我们需要将其拼接成一个完整的海岸线进行进一步的研究。但海滩特征点难以提取,本文采用基于区域的模板匹配方法对其进行拼接。针对经典穷举搜索算法耗时长、模板选择效率低的问题,提出了一种高效的模板匹配方法。通过实验,可以比MAD方法更好更快地拼接大部分海岸线。
{"title":"Region-based template matching method for multi-view coastline image stitching","authors":"Bo Wang, Zhiqiang Wei, Z. Li, Wei Hu, Shuang Wang, Shugang Zhang, Changehe Du, Wenjuan Shi","doi":"10.1109/ICSESS.2017.8343005","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8343005","url":null,"abstract":"Coastal environment is one of the most important part in human activities environment, so coastline studying has great significance to us. Since the coastline stretches widely, shot by many cameras at the same time in different regions currently, and we need spliced it into a complete coastline for further study. However, the feature points of the beach are difficult to be extracted, we use the region-based template matching method to splice it in this paper. An efficient template matching method was proposed to solve the time-consuming classical algorithm of exhaustive search and low efficiency of template selection. Through the experiments, most of the coastline can be spliced better and faster than MAD method.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114529553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intrusion detection for engineering vehicles under the transmission line based on deep learning 基于深度学习的输电线路下工程车辆入侵检测
Chunjiang Yan, Chuang Wang, J. Du, Hualin Fang, Yixuan Wang, Xuezhi Xiang, Xinli Guo
A two-step method based on deep learning is proposed for the intrusion detection of engineering vehicles working under high power transmission lines. In the first step, intrusion detection algorithm is used to identify the potential target area. Then the results are supplied to a trained deep convolution neural network classifier. This way combining intrusion detection method with CNN, the invasion of the engineering vehicles under high power transmission lines can efficiently be detected up to an accuracy of 97.2 %.
提出了一种基于深度学习的两步法工程车辆入侵检测方法。第一步采用入侵检测算法识别潜在目标区域;然后将结果提供给训练好的深度卷积神经网络分类器。该方法将入侵检测方法与CNN相结合,可以有效检测出高压输电线路下工程车辆的入侵,准确率高达97.2%。
{"title":"Intrusion detection for engineering vehicles under the transmission line based on deep learning","authors":"Chunjiang Yan, Chuang Wang, J. Du, Hualin Fang, Yixuan Wang, Xuezhi Xiang, Xinli Guo","doi":"10.1109/ICSESS.2017.8342861","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342861","url":null,"abstract":"A two-step method based on deep learning is proposed for the intrusion detection of engineering vehicles working under high power transmission lines. In the first step, intrusion detection algorithm is used to identify the potential target area. Then the results are supplied to a trained deep convolution neural network classifier. This way combining intrusion detection method with CNN, the invasion of the engineering vehicles under high power transmission lines can efficiently be detected up to an accuracy of 97.2 %.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving test case prioritization based on practical priority factors 改进基于实际优先级因素的测试用例优先级
Md. Hasan Mahmood, M. S. Hosain
Test case prioritization involves prioritized the test cases for regression testing which improve the effectiveness of the testing process. By improving test case scheduling we can optimize time and cost as well as can produce better tested products. There are a number of methods to do prioritized test cases but not that effective or practical for the real-life large commercial systems. Most of the technique deals with finding defects or covering more test cases. In this paper, we will extend the previous work to incorporate real life practical aspects to schedule test cases. This will cover most of the businesses functionally based on the practical aspects. This approach covers more business area and ensure more defects. By prioritized test cases with this technique we will cover most important business functionally with less number of test cases.
测试用例优先级包括对回归测试的测试用例进行优先级排序,从而提高测试过程的有效性。通过改进测试用例调度,我们可以优化时间和成本,也可以产生更好的测试产品。有许多方法可以进行优先级测试用例,但对于现实生活中的大型商业系统来说,这些方法并不那么有效或实用。大多数技术处理的是发现缺陷或覆盖更多的测试用例。在本文中,我们将扩展以前的工作,以结合实际生活中的实际方面来安排测试用例。这将涵盖基于实际方面的大部分业务功能。这种方法覆盖了更多的业务领域,保证了更多的缺陷。通过使用这种技术对测试用例进行优先级排序,我们将用更少的测试用例覆盖最重要的业务功能。
{"title":"Improving test case prioritization based on practical priority factors","authors":"Md. Hasan Mahmood, M. S. Hosain","doi":"10.1109/ICSESS.2017.8343055","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8343055","url":null,"abstract":"Test case prioritization involves prioritized the test cases for regression testing which improve the effectiveness of the testing process. By improving test case scheduling we can optimize time and cost as well as can produce better tested products. There are a number of methods to do prioritized test cases but not that effective or practical for the real-life large commercial systems. Most of the technique deals with finding defects or covering more test cases. In this paper, we will extend the previous work to incorporate real life practical aspects to schedule test cases. This will cover most of the businesses functionally based on the practical aspects. This approach covers more business area and ensure more defects. By prioritized test cases with this technique we will cover most important business functionally with less number of test cases.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"323 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122710420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel security validation in embedded system 一种新的嵌入式系统安全验证方法
Xiang Wang, Bin Xu, Weike Wang, Lin Li, Pei Du, Cheng Zhou, Mingzhe Li, Tongsheng Xia
Most embedded systems contain a number of software vulnerabilities, such as program buffer overflow. The physical attacks in embedded systems are also becoming more and more common. This paper presents a fast, effective and reliable algorithm for tagging and validating what can be used in embedded systems. The compiler automatically collects the secure tags for each main memory segment at compile time. At run-time, the designed hardware observes the dynamic execution trace, and checks whether the trace conforms to the permissible behavior and triggers the appropriate response mechanisms according to the check result. This design does not change the compiler or the existing instruction set, with no restriction on the software developer. The design is implemented on an actual SOPC platform. Experimental analysis shows that the proposed techniques can eliminate a wide range of common software and physical attacks, with low performance penalties and minimal overheads.
大多数嵌入式系统都包含许多软件漏洞,例如程序缓冲区溢出。嵌入式系统中的物理攻击也变得越来越普遍。本文提出了一种快速、有效、可靠的标记和验证算法,可用于嵌入式系统。编译器在编译时自动收集每个主内存段的安全标记。在运行时,所设计的硬件观察动态执行跟踪,检查跟踪是否符合允许的行为,并根据检查结果触发相应的响应机制。这种设计不改变编译器或现有的指令集,对软件开发人员没有限制。该设计在一个实际的SOPC平台上实现。实验分析表明,所提出的技术可以消除各种常见的软件和物理攻击,性能损失低,开销最小。
{"title":"A novel security validation in embedded system","authors":"Xiang Wang, Bin Xu, Weike Wang, Lin Li, Pei Du, Cheng Zhou, Mingzhe Li, Tongsheng Xia","doi":"10.1109/ICSESS.2017.8342994","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342994","url":null,"abstract":"Most embedded systems contain a number of software vulnerabilities, such as program buffer overflow. The physical attacks in embedded systems are also becoming more and more common. This paper presents a fast, effective and reliable algorithm for tagging and validating what can be used in embedded systems. The compiler automatically collects the secure tags for each main memory segment at compile time. At run-time, the designed hardware observes the dynamic execution trace, and checks whether the trace conforms to the permissible behavior and triggers the appropriate response mechanisms according to the check result. This design does not change the compiler or the existing instruction set, with no restriction on the software developer. The design is implemented on an actual SOPC platform. Experimental analysis shows that the proposed techniques can eliminate a wide range of common software and physical attacks, with low performance penalties and minimal overheads.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123886948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of spacecraft solar array electrical performance simulation system 航天器太阳能电池阵电性能仿真系统的研制
Tao Li, Wei Li, Lei Yang
The spacecraft electrical power system (EPS) employs photovoltaic array (PVA) to supply power to platform and user loads. Thus, it is important to predict power production capability of PVA for spacecraft mission planning and certification of on-orbit flight operating. The PVA performance is primarily determined by irradiation level, temperature, and solar array shadowing. To provide an accurate and flexible method for analyzing spacecraft PVA performance, the author developed spacecraft Solar Array Electrical Performance Simulation system (SAEPS). The SAEPS was consisted of 5 modules: simulation setting module, orbit mechanics module, geometric model control module, shadow analysis module, power supply capability analysis module. The current vs. voltage (I-V) model of photovoltaic (PV) cell under on-orbit irradiation intensity, temperature and shadow was built. The model of PV string, which is composed of PV cells, bypass diodes and block diodes, is built. Output current of PVA is obtained by summing all strings output currents at predefined bus voltage. Simulation was performed for a typical spacecraft in this paper. Results show this method is applicable to arbitrary illumination levels, temperatures and shadow patterns, and accuracy improved 20% compared to traditional method.
航天器电力系统(EPS)采用光伏阵列(PVA)为平台和用户负载供电。因此,预测PVA发电能力对航天器的任务规划和在轨飞行运行验证具有重要意义。聚乙烯醇性能主要取决于辐照水平、温度和太阳能阵列遮挡。为了提供一种准确、灵活的分析航天器PVA性能的方法,作者开发了航天器太阳阵电气性能仿真系统(SAEPS)。SAEPS由5个模块组成:仿真设置模块、轨道力学模块、几何模型控制模块、阴影分析模块、供电能力分析模块。建立了在轨辐射强度、温度和阴影条件下光伏电池的电流-电压(I-V)模型。建立了由光伏电池、旁路二极管和分块二极管组成的PV串模型。PVA的输出电流是在预先设定的母线电压下将所有串的输出电流相加得到的。本文对某典型航天器进行了仿真。结果表明,该方法适用于任意光照水平、温度和阴影模式,精度比传统方法提高了20%。
{"title":"Development of spacecraft solar array electrical performance simulation system","authors":"Tao Li, Wei Li, Lei Yang","doi":"10.1109/ICSESS.2017.8343018","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8343018","url":null,"abstract":"The spacecraft electrical power system (EPS) employs photovoltaic array (PVA) to supply power to platform and user loads. Thus, it is important to predict power production capability of PVA for spacecraft mission planning and certification of on-orbit flight operating. The PVA performance is primarily determined by irradiation level, temperature, and solar array shadowing. To provide an accurate and flexible method for analyzing spacecraft PVA performance, the author developed spacecraft Solar Array Electrical Performance Simulation system (SAEPS). The SAEPS was consisted of 5 modules: simulation setting module, orbit mechanics module, geometric model control module, shadow analysis module, power supply capability analysis module. The current vs. voltage (I-V) model of photovoltaic (PV) cell under on-orbit irradiation intensity, temperature and shadow was built. The model of PV string, which is composed of PV cells, bypass diodes and block diodes, is built. Output current of PVA is obtained by summing all strings output currents at predefined bus voltage. Simulation was performed for a typical spacecraft in this paper. Results show this method is applicable to arbitrary illumination levels, temperatures and shadow patterns, and accuracy improved 20% compared to traditional method.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124224055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FPGA-based packets processing acceleration platform for VNF 基于fpga的VNF包处理加速平台
Tianyi Lan, Qing Han, Hongwei Fan, Julong Lan
While there has been a belief over the past few years that virtual network functions (VNFs) should be built on common servers, we argue that it can lead to limited performance and large up/down traffic. This paper proposes a new idea of shifting part of NFV functions from software packages to common hardware devices to promote overall performance. Then we present the design and implementation of PPAP, a Packets Processing Acceleration Platform for NFV. It offers high flexibility by allowing functions to control the processing flow of hardware. Dynamic match tables and virtualization techniques ensure isolation among VNF instances.
虽然在过去的几年里,有一种观点认为虚拟网络功能(VNFs)应该构建在公共服务器上,但我们认为它可能会导致有限的性能和大量的上下流量。本文提出了将部分NFV功能从软件包转移到通用硬件设备上以提升整体性能的新思路。在此基础上,提出了NFV报文处理加速平台PPAP的设计与实现。通过允许功能控制硬件的处理流程,它提供了高度的灵活性。动态匹配表和虚拟化技术确保了VNF实例之间的隔离。
{"title":"FPGA-based packets processing acceleration platform for VNF","authors":"Tianyi Lan, Qing Han, Hongwei Fan, Julong Lan","doi":"10.1109/ICSESS.2017.8342922","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342922","url":null,"abstract":"While there has been a belief over the past few years that virtual network functions (VNFs) should be built on common servers, we argue that it can lead to limited performance and large up/down traffic. This paper proposes a new idea of shifting part of NFV functions from software packages to common hardware devices to promote overall performance. Then we present the design and implementation of PPAP, a Packets Processing Acceleration Platform for NFV. It offers high flexibility by allowing functions to control the processing flow of hardware. Dynamic match tables and virtualization techniques ensure isolation among VNF instances.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130027180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1